{"id":"CVE-2025-38399","summary":"scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()\n\nThe function core_scsi3_decode_spec_i_port(), in its error code path,\nunconditionally calls core_scsi3_lunacl_undepend_item() passing the\ndest_se_deve pointer, which may be NULL.\n\nThis can lead to a NULL pointer dereference if dest_se_deve remains\nunset.\n\nSPC-3 PR SPEC_I_PT: Unable to locate dest_tpg\nUnable to handle kernel paging request at virtual address dfff800000000012\nCall trace:\n  core_scsi3_lunacl_undepend_item+0x2c/0xf0 [target_core_mod] (P)\n  core_scsi3_decode_spec_i_port+0x120c/0x1c30 [target_core_mod]\n  core_scsi3_emulate_pro_register+0x6b8/0xcd8 [target_core_mod]\n  target_scsi3_emulate_pr_out+0x56c/0x840 [target_core_mod]\n\nFix this by adding a NULL check before calling\ncore_scsi3_lunacl_undepend_item()","modified":"2026-04-16T04:31:07.273644903Z","published":"2025-07-25T12:53:43.211Z","related":["SUSE-SU-2025:02853-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:02969-1","SUSE-SU-2025:02996-1","SUSE-SU-2025:02997-1","SUSE-SU-2025:03011-1","SUSE-SU-2025:03023-1","SUSE-SU-2025:20577-1","SUSE-SU-2025:20586-1","SUSE-SU-2025:20601-1","SUSE-SU-2025:20602-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","openSUSE-SU-2025:20081-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38399.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1129e0e0a833acf90429e0f13951068d5f026e4f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1627dda4d70ceb1ba62af2e401af73c09abb1eb5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/55dfffc5e94730370b08de02c0cf3b7c951bbe9e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/70ddb8133fdb512d4b1f2b4fd1c9e518514f182c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7296c938df2445f342be456a6ff0b3931d97f4e5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c412185d557578d3f936537ed639c4ffaaed4075"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d8ab68bdb294b09a761e967dad374f2965e1913f"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38399.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38399"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039"},{"fixed":"70ddb8133fdb512d4b1f2b4fd1c9e518514f182c"},{"fixed":"1129e0e0a833acf90429e0f13951068d5f026e4f"},{"fixed":"1627dda4d70ceb1ba62af2e401af73c09abb1eb5"},{"fixed":"55dfffc5e94730370b08de02c0cf3b7c951bbe9e"},{"fixed":"7296c938df2445f342be456a6ff0b3931d97f4e5"},{"fixed":"c412185d557578d3f936537ed639c4ffaaed4075"},{"fixed":"d8ab68bdb294b09a761e967dad374f2965e1913f"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38399.json"}}],"schema_version":"1.7.5"}